Discover Performance

HP Software's community for IT leaders // February 2012
Subscribe

Five trends reshaping enterprise security

Mobility, consumerization … It’s time to rethink enterprise security in terms of five emerging trends and the four-step response they demand.

Threats to your IT systems are more persistent, sophisticated and unpredictable than ever. Every business decision has inherent risk, and it’s essential to make decisions based on the cost and potential value of that risk.

Five recent trends are having a significant impact on risk:

  • Consumerization—Enterprise employees bring personal devices to work and take work devices home, which makes controlling network access, identity, application permissions and other elements more difficult.
  • Mobility—Data has a level of mobility never experienced before, requiring mobile devices to accommodate secure operations.
  • Cloud—The benefits of cloud computing include leveraging standardized applications, reducing maintenance, implementing pay-per-use models and lowering capital expenditures. But along with the benefits comes risk to compliance, privacy and transaction security.
  • Cyber-threats—The range and potential damage of cyber-threats increases daily. Today’s most damaging cyber-attacks exploit multiple points of entry plotted over time to avoid individual detection while collectively posing a major threat.
  • Social media—The ability to aggregate and correlate the data that might be shared on Twitter, Facebook or LinkedIn makes it much easier for sensitive information to inadvertently be exposed.

Build a sustainable security ecosystem
A traditional approach to enterprise security gives you bolted-on point solutions—an uncoordinated bunch of unrelated products and services. That’s not enough. Nearly half of all enterprises have a designated CISO whose primary job is to protect information capital, and if you are that CISO, you’re probably already rethinking enterprise security in a broader context.

You need to think about:

  • New landscapes: managing risk in the era of consumerization of IT, mobile computing, cloud adoption, cyber-threats and the spread of social media technologies.
  • New foes: protecting against increasingly sophisticated threats.
  • New tools: improving detection of, and reaction time to, security incidents.
  • New internal pressures: reducing administration costs and efficiently spending security dollars.
  • New regulatory pressures: achieving compliance predictably and cost-effectively.

Address these priorities by establishing a framework to link information security management and governance with the operations and technology required to achieve end-to-end security. Such a holistic, start-to-finish approach is the only way to effectively, intelligently manage risk in this era.

End-to-end security in four phases
Traditional approaches to security are often fragmented and impose constraints on users. The HP approach encompasses four phases:

  1. Assess your risk tolerance profile, compliance requirements, operational requirements, organizational capabilities and resources.
  2. Transform your organization’s approach to security from managing it in silos to taking a holistic view.
  3. Manage the associated security transformation programs required to deliver security most effectively.
  4. Optimize by continually monitoring the environment to proactively recommend operational and process improvements and initiatives that will deliver an enhanced security and risk posture.

The challenge is to develop a strategy that applies this phased approach to the areas of your business that must be secured today: data and information, applications, identity, endpoint and network.

For more about what to consider when rethinking your approach to enterprise security, read the white paper, “Rethinking your Enterprise Security: Critical Priorities to Consider,” and visit HP Enterprise Security.


x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Events

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.


Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

HP Software related

Most read articles

Discover Performance

Archive

Tweets @ HPSecurity